The digital file management and imaging system and method of the present invention record additional independent data with each stored image including: a “true date” which is gleaned from a secure clock which is not settable by the user (the Authentidate™); a number derived from a cyclic redundancy code (CRC) algorithm against the image data; this number is called the “image CRC”; and a CRC derived from the “true date”, called the “date CRC”. This additional data is recorded within each digital file as soon as possible after the file is acquired. If the file is altered in any way after the recording of the additional data, recalculation of the image CRC on the altered file will not match the original image CRC recorded within it. Thus, the fact that it has been altered can be detected. Likewise, if the true date is altered in any way, recalculation of the date CRC will similarly reveal this fact. The image and date CRCs can be checked and verified at any time. If the recalculated value matches the recorded value, it can be stated that the image presently recorded was recorded on the specified date and has not been altered in any way since then.
|
1. A method of digital file management and imaging comprising:
providing a digital file;
providing a date and time from a secure date and time reference from a local source;
calculating a date/time value from said date and time using a mathematical process;
generating an image value derived from said digital file;
marking said digital file with said date and time, said date/time value and said image value; and
storing said marked digital file.
8. A digital file management and imaging system comprising:
means for inputting a digital file;
a secure date and time reference providing a date and time;
means for calculating a date/time value derived from said date and time using a mathematical process;
means for generating an image value derived from said digital file;
means for marking said digital file with said date and time, said date/time value and said image value; and
means for storing said marked digital file.
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
10. The system of
11. The system of
12. The system of
13. The system of
14. The system of
15. The system of
16. The system of
17. The system of
|
This application is a continuation of U.S. patent application Ser. No. 09/259,135 now abandoned filed Feb. 26, 1999.
This invention relates generally to digital imaging systems and more particularly to digital file authentication.
Digital imaging is the representation, and storage, of an image or object as a digital raster image. Digital imaging is increasingly used in many industries, partly because of the increased availability of enabling technology and partly due to the many advantages offered over conventional storage methods including: reduced storage space, increased access speed, focused retrievability (e.g., search capabilities), the ability to conveniently make “multiple” and “backup” copies of documents, and the ability to transfer or transmit documents quickly.
In the case of paper document originals, digital imaging systems will typically scan the paper document and store a representation of the scanned document as a digital raster image. An optical scanning device is typically used to scan images of the paper originals for storing as a digital image. The scanned images are exact representations of the original (limited only by the resolution limit of the scanning device), and can include handwriting, signatures, photos, figures, etc. Alternatively, digital images originating from digital cameras, medical imaging devices, or other sources may also be stored in a digital imaging system.
One drawback of known imaging technology is the inherent ability of digital images to be altered, for example, with a purpose to defraud. For example, although an original paper document can be tampered with, such tampering (erasure or additions) will typically leave telltale evidence, digital images of those documents, on the other hand, can be perfectly altered leaving no such evidence. Thus, where the authenticity of an image is critical and may come into question (e.g., legal and medical fields), use of digital images is often not preferred, not acceptable or not admissible and therefore often avoided.
While many different digital image formats are available, in each case, the data is potentially alterable. Even if the digital imaging system does not explicitly provide an editing function, the images can be edited with a third party tool.
A proposed solution is the use of Write-Once, Read-Many (“WORM”) optical media to store digital images. One advantage of WORM media storage is that the data it houses is inherently unalterable data can be written only one time to the medium. However, this approach has several disadvantages as well. For example, data recorded on WORM media can be copied from the WORM disk of original recording to re-writable media, altered, and then recorded on new WORM disk with no traceability of such events.
Additionally, although it can be stated with great confidence that data on any one particular WORM disk has not been altered since it was recorded on that disk, the date and time when the data was recorded or whether the data matches an “original” of any kind cannot be determined with any certain or definitive means.
A known advance in file verification technology provides for registration of an “electronic signature” of a digital file (image, word processor document, audio or video clip, etc.). It is known to allow a user to locally select a file and locally run a program provided by a service provider to create an “electronic signature” of the selected digital file based solely on file content. The signature along with a user-provided file name and user-selected keywords are uploaded to He provider's site and stored in a registration database maintained by the service provider under an account established for the particular user. One particular provider generates a “certificate of registration” showing, inter alia, the signature.
Verification of content and submittal date of the digital file at a later time requires going on-line to access the service provider's site and retrieving the prior registration record by file name or keywords. The retrieved database record shows the file signature and the original date that the file signature was registered. To complete verification, the user must run (locally again) the electronic signature program on the file to be verified and compare the regenerated signature to the retrieved registered signature to determine whether the signature of the digital file in question matches that of the originally registered file.
What the user now has is verification that the signature of the file in hand matches the signature of a file which was registered on a particular date.
The foregoing and other problems and deficiencies in image authentication in known digital imaging systems are solved and a technical advance is achieved by the present invention for providing digital file authentication by secure image marking.
In various aspects, it is among the objects of the present invention to provide a system and method for digital file management providing digital file authentication by secure file marking.
A digital file management system in one embodiment of the present invention comprises means for inputting a digital file and a secure date and time reference providing date and time information. A date/time value is generated which is derived from the secure date and time information. An image value is derived from the digital file itself. The digital file is marked with the date and time information, the date/time value and the image value. The marked digital file is then stored.
Alternative embodiments can include such features as generating the date/time value and image value by a cyclic redundancy code algorithm and transforming the date/time value and image value via a mathematical transformation and marking the digital file with the transformed values.
In other embodiments, the secure date and time reference is a local secure clock.
In various embodiments, the digital file can be an image file, a text file or any other file format.
Alternative embodiments of the invention allow for inputting a digital image by way of an optical scanner for scanning an original image into a digital image or directly from digital cameras or medical imaging equipment. The marked digital file can also be stored in optical storage.
The foregoing and other features and advantages of the present invention will become more apparent in light of the following detailed description of exemplary embodiments thereof, as illustrated in the accompanying drawings, where
The following description of the present invention uses for illustrative purposes the Authentidate™ image authentication system incorporated in the turn-key document management and imaging system, DocSTAR™, both of which are available from BitWise Designs, Inc, the assignee of the present invention. While the DocSTAR embodiment of the present invention is geared towards storing, marking and authenticating paper document originals, any digital file can be processed by the method and system of the present invention as will be described. The following discussion with references to the DocSTAR embodiment are in no way intended to be limiting and are made for illustrative purposes only to facilitate explanation and understanding of the present invention.
A DocSTAR system host 100 is configured in communication with an input device 110, storage device 120 and a secure time and date reference 130.
In this embodiment, system host 100 is implemented as a IBM PC or workstation, input device 110 is an optical scanner, storage device 120 is an optical storage device and the secure time and date reference 130 is provided by a hardware key which incorporates a secure clock.
Original images will be scanned by optical scanner 110. The resulting digital image will be processed by system host 100 according to the method of the present invention which will be discussed in further detail herein, and then stored on optical storage device 120 from where it can be later retrieved.
The image authentication system of the present invention operates in one aspect by recording additional independent data with each stored digital file. These additional data includes: a “true date” which is gleaned from a secure clock (described in further detail below) which is not settable by the user (the Authentidate™); a number derived from a cyclic redundancy code (CRC) algorithm (described in further detail below) against the image data, this number is called the “image CRC”; and a CRC derived from the “true date”, called the “date CRC”.
These additional data is preferably recorded within each digital file as soon as possible after the image is acquired by the system (from, for example, scanner 110 in the DocSTAR embodiment). As will be discussed in further detail, if the image is altered in any way after the recording of the additional data, recalculation of the image CRC on the altered image will not match the original image CRC recorded within it. Thus, the fact that the image has been altered or is otherwise compromised can be detected. Likewise, if the true date is altered in any way, recalculation of the date CRC will similarly reveal this fact.
The image and date CRCs can be checked and verified at any time. If the recalculated value matches the recorded value, it can be stated with extreme confidence that the image presently recorded was recorded on the specified date and has not been altered in any way since then. No other known system, including paper storage, can offer similar assurance as to the creation date or authenticity of a document.
With reference to
Digital files are first acquired (either retrieved from storage or received from input device 110). (Step 200.) Date and time information is obtained from secure clock 130. (Step 202.) Proper operation of the secure clock is assessed. (Step 204.) If the secure clock is deemed functional, then the date and time data are accepted as read from the clock (in step 202). If a failure of the secure clock is determined, an error indication will be returned and the image processing is halted. (Step 206.) With the clock having been deemed functional (in step 204), special tags (as will be discussed infra) and the Authentidate information (including date and time) are added to the digital file and the CRC data fields are initialized to 0 (i.e., the data fields are filled with 0's). (Step 208.)
Two computed values are then calculated, which are derived from the image content and Authentidate information, respectively. The computed values can be computed in any fashion based on data contained within the digital file which will allow detection of data corruption, such as for example, a standard checksum. In this embodiment of the present invention, cyclic redundancy codes (“CRC”), essentially a more complex checksum calculation, are used to derive the computed values. Any calculation method, however, is acceptable which will provide a number which is derived from the document content data and is suitable for detection of data corruption.
In this embodiment, the computed values are generated by a known CRC algorithm (which will be discussed in further detail below) which is run on both the image content and the Authentidate, creating an Image CRC and an Authentidate CRC, respectively. (Steps 210, 212.) The Image CRC and Authentidate CRC are “transformed” by a proprietary mathematical transformation for added security (as will be discussed infra) creating an Image CRC′ and an Authentidate CRC′. (Step 214.)
The image file is then marked with the Image CRC′ and Authentidate CRC′. (Step 216.) The marked digital files are stored on optical media by optical storage device 120. (Step 218.)
The authenticity of the image and the time and date stamp can then subsequently be determined by examining the computed values stored within the Digital Files as shown in
The first step in validating the CRCs in an digital file is to read the special tag and date areas and retrieve the stored image CRC and date CRC values. (Step 300.) If the CRC values cannot be located or read in the digital file (step 302), then, it is determined that either the image has not been properly filed or the image has been altered or is otherwise compromised, and an error is posted. (Step 304.) If the special tags are found, the CRCs are recalculated for the digital file and the date string. (Step 306.) The same algorithms used to calculate the CRCs initially are used to regenerate them at this point. The recalculated image CRC is transformed and compared to the image CRC read from the tag. (Step 308.) (Alternatively, the stored image CRC can be reverse transform prior to comparison to the recalculated value.) If the recalculated digital file CRC does not match the one stored in the special tag, the image is determined to have been altered or otherwise be corrupted and an error is indicated. (Step 310.) If the stored and recalculated image CRCs compare favorably (i.e., they match), the date CRCs are tested. The recalculated date CRC is transformed and compared to the date CRC read from the tag. (Step 312.) (Alternatively, the stored date CRC can be reverse transformed prior to comparison with the recalculated value.) If the recalculated date CRC does not match the one stored in the special tag, the date string is determined to have been altered or be otherwise corrupted and an error is indicated. (Step 314.) If the date CRCs match, at this point both image and date CRCs have compared favorably, the digital file is determined to be unaltered and thus authenticated. (Step 316.)
As will be appreciated from the foregoing description, the use of a secure, non-compromisable clock is fundamental to the present invention. It serves as a secure time and date source which is not alterable by the user. The secure clock maintains the time and date even when the computer is turned off with the aid of a battery backup.
One could use either custom designed hardware or a commercially available product that offers a secure clock. In either case, a mechanism must be in place to prevent fraudulent or arbitrary date/time adjustment.
In the DocSTAR embodiment, a commercially available product that incorporates a secure clock into a physical hardware key is utilized (sometimes called a “dongle”). The hardware key connects to the computer's parallel port and can be accessed through an application programming interface (API) provided by the manufacturer.
The hardware key chosen for use in the DocSTAR embodiment of the present invention is the TIMEHASP-4 available from Aladdin Knowledge Systems, LTD. The security of the hardware key is protected by a custom ASIC chip (Application Specific Integrated Circuit), a unique set of passwords used only by the system provider (for example, BitWise Designs, Inc. the assignee hereof and a “provider” of the DocSTAR system) and advanced protection algorithms and anti-debugging technology in the manufacturer's programming interface and device drivers. This offers a high degree of security for the secure clock.
The current date and time are factory programmed into the secure clock contained within the hardware key during assembly of the DocSTAR Host computer. While any time setting may be used, the secure clock in this embodiment is set to Greenwich Mean Time (GMT) eliminating the need to adjust the clock for different local time zones or for daylight savings time.
A mechanism can be incorporated to make adjustments in the clock to reset or correct the clock for slight inaccuracies that can develop over time. For example, in one embodiment as illustrated in
In this embodiment, an authentication code is required to change the secure clock. To obtain this code, a support technician on the system provider system enters the Hardware Key serial number and the current secure clock date into a secured custom program (the “Eagle Call Tracking System”) maintained at BitWise Designs, Inc. (step 400) which will generate an authentication code (step 402). The authentication code will allow the field technician or end user to change the secure clock only to the date and time established and maintained at BitWise Designs, Inc.
The authentication code in this embodiment is determined through a mathematical algorithm which yields one unique code given the current secure clock date, the hardware key serial number, and the desired change to date and time. This authentication code is of limited validity in that it will not work on another day in the future to reset the clock to the date and time on the day the authentication code was given.
The code is entered at the user end. (Step 404.) The desired clock setting is entered at the user end. (Step 406.) The administration program used on the client system allows a small time window (20 minutes) for which any time entered will match the authentication code. Authentication codes are calculated internally for times 5 minutes before and 15 after the given change to time. If the given authentication code matches any of the codes within the time window, the authentication code is deemed correct and implemented. This will allow a field technician to account for several minutes delay while the authentication code is communicated.
Thus the desired setting is validated against the authentication code to determine whether the code will authenticate the date and time change requested. (Step 408.) If invalidity is determined, an error is returned and the clock is not updated. (Step 409.) With a valid request, the actual change to the secure clock will not occur until the Update Clock command is entered at the user end. (Step 410.) This allows a field technician to accurately synchronize the field clock with the clock maintained at BitWise Designs, Inc. After the Update Command is issued, the authentication code is re-validated against the clock information to ensure it is still valid. (Step 412.) If invalidity is determined, an error is returned and the clock is not updated. (Step 413.) The clock is updated. (Step 414).
Alternatively, secure clocks can be reprogrammed by the service provider at the provider's facility (e.g., BitWise Designs, Inc.) by attaching the hardware key directly to a designated Eagle system at BitWise Designs, Inc. and issuing the update secure clock command. The hardware key serial number is verified and the secure clock date and time are updated to GMT date and time maintained at BitWise Designs, Inc.
In further alternative embodiments, clock adjustments to correct for inaccuracies that can develop over time or to set the clock can be implemented as an automated process where a user can cause a clock update from a remote secure clock but the user cannot himself actually set the clock information.
Either the manual or automated method of clock setting and update described above will prevent the user from altering the secure clock arbitrarily and thereby stamping images with an incorrect or fraudulent date and time.
As can be expected within the limits of current available technology, the battery in each clock will eventually fail, or the clock can otherwise become defective over time. These conditions are tested by software prior to image processing to ensure that invalid dates from a defective clock (or dead battery) are not recorded in images, thus compromising the reliability of the image marking. In the event of a clock failure, image filing is disabled until the clock is repaired or replaced.
The computed values mentioned above with reference to
A technical discussion of the CRC-32 algorithm will not be presented here. There are many sources of CRC-32 algorithms and source code in the public domain. Sample C++ source code for a CRC32 algorithm which is implemented in the DocSTAR embodiment of the present invention, is attached as an appendix hereto. As stated earlier, use of the CRC is not required for the present invention per se, and any calculation method is acceptable which will provide a number which is derived from the image data and is suitable for detection of data corruption.
While a CRC value alone may be used a higher level of security can be incorporated into the present invention to ensure the authenticity of an image by addition of a mathematical transformation to the CRC value. As indicated, a typical algorithm to calculate a CRC-32 is in the public domain and thus easily accessible. This fact, in conjunction with the details provided herein, would allow anyone to recalculate the CRC on an altered image, enabling them to counterfeit an “Authentidate” and falsely confirm the image as authentic and unaltered. In the present invention, the actual calculated (image or date) CRC is mathematically transformed to a new value prior to image marking. The functional requirements of the transformation are that the resultant value for any input value is consistent, and that the resultant value is unique for each unique input value. The transformation could, for example, be a permutation of the bit-order of the input, an exclusive OR of the input value with a consistent, predetermined “magic” number, or a combination of these operations.
While the particular transformation technique implemented is not critical, it should be understood that the specific technique used to accomplish the transformation in the practice of this invention should remain confidential to the provider, i.e., a “proprietary transformation technique”, as any disclosure or dissemination of the method would likely compromise system security and effectiveness. To give a simple parallel, failure to safeguard the proprietary transformation technique would essentially be the equivalent of password protecting a file and then distributing the password.
Recording information in tags within digital files requires knowledge of the individual digital file formats and the standards governing the structure of their formats. These standards dictate how information will be stored in the file, in what order, using what compression algorithm, etc. Most digital file formats have provisions for accommodating storage of user data in the digital file in addition to the image data. The DocSTAR file management and imaging system embodiment of the present invention uses known TIFF (Tagged Image File) and JPEG (Joint Photographic Experts Group) file formats for storage of (scanned) bitonal and color images, respectively. The standards for TIFF and JPEG image file formats allow for inclusion of user data inside the image file in a manner which does not affect the displayed image. As will be readily understood, the present invention is equally applicable to other file formats which have a mechanism to store user-defined data in the file or the file marked with the user-defined data can be stored in an ancillary file or separate database, for example, for word processing documents, spreadsheets, digitized audio or video or any other digitized file.
The known TIFF format is a file format which allows image data to be stored in a compressed manner along with information about the image (tags) such as compression method used, resolution, size, number of colors, title, date, etc.
A written world-wide standard defines the TIFF file format, what tags must be present, what tags are optional and how specific tags are used. The maintaining organization of the TIFF standard, Adobe Corporation, accepts requests for custom tag numbers for companies developing applications which use tags within the TIFF image. Adobe will assign unique numbers to individual companies to prevent interference between vendors. For example, BitWise Designs, Inc., the assignee hereof, applied for and was assigned its own proprietary tags numbers, other vendors will likewise be assigned their own unique proprietary tag numbers. Use of a custom tag allows storage of a custom data block. The TIFF specification calls for programs to ignore tags that they do not understand and which are not in the baseline specification. This allows common image viewers to view, display and print images which have custom tags because the image files still fit the TIFF specification.
In the case of TIFF image files, the following TIFF image tags are used:
Tag #
Use
10Dh
Document Name
10Eh
Image Description
132h
Date Time
9244h
BitWise DocSTAR Custom Tag 1
custom data block contains proprietary information including:
Image CRC
Authentidate CRC
Illustrated in
All tags and data areas are processed except the following tags and data areas (step 508):
Tag #
Description
0x010d
TIFFTAG_DOCUMENTNAME
0x010e
TIFFTAG_IMAGEDESCRIPTION
0x0132
TIFFTAG_DATETIME
0x9244
TIFFTAG_DOCSTARTAG1
After processing all IFD entries for the file (step 506), the proprietary transformation method (as described above) is used to transform the resulting CRC value into a unique and secure value CRC′. (Step 512.) The transformed image CRC value, CRC′ is then stored in the image file. (Step 514.)
Illustrated in
The Joint Photographic Experts Group developed the namesake format and maintains the standard for JPEG and the JPG file format (sometimes also called JFIF-JPEG File Image Format). This format was developed for the storage and transmission of photographic images. The compression techniques used are ideally suited to storing subtle differences between color changes, such as a photograph.
As is known, a JPG file is interpreted as a stream of characters with special identifiers called “markers” separating different elements of the image information and image data. The exact meaning of each marker is not important to this discussion except that the JPG standard defines a set of markers to be used by manufacturers for special or proprietary features. These markers are named “APPx” where x is a digit between 0 and 9 inclusive.
The present invention adds a special marker and data block to JPG files when they are stored. In this embodiment, the “APP8” marker will be used for the simple reason that this marker is rarely used by other manufacturers. This marker holds various proprietary information including the following:
Illustrated in
Illustrated in
The present invention has been illustrated and described with respect to specific embodiments thereof. It is to be understood, however, that the above-described embodiments are merely illustrative of the principles of the invention and are not intended to be exclusive embodiments. To facilitate discussion of the present invention, paper document originals (e.g., paper, photos, etc.) which are scanned into digital images are presumed in the DocSTAR embodiment of the present invention. However, it should be understood by one skilled in the art, that the present invention will be equally applicable to any digital file regardless of its source or how it is generated, for example, digital images originating from digital cameras, medical imaging devices, word processing or spreadsheet applications or other sources.
Alternative embodiments capturing variations in the enumerated embodiments disclosed herein can be implemented to achieve the benefits of the present invention.
It should further be understood that the foregoing and many various modifications, omissions and additions may be devised by one skilled in the art without departing from the spirit and scope of the invention.
It is therefore intended that the present invention is not limited to the disclosed embodiments but should be defined in accordance with the claims which follow.
Patent | Priority | Assignee | Title |
7983513, | Apr 04 2006 | Canon Kabushiki Kaisha | Image processing apparatus, control method thereof, and program |
9108823, | Mar 12 2010 | Mitsubishi Electric Corporation | Elevator safety control device |
9953100, | Jan 27 2010 | AURAPLAYER LTD | Automated runtime command replacement in a client-server session using recorded user events |
Patent | Priority | Assignee | Title |
4145568, | Oct 18 1963 | OMNISEC AG, TROCKENLOOSTRASSE 91, CH-8105 REGENSDORF, SWITZERLAND, A CO OF SWITZERLAND | Method and apparatus for ciphering and deciphering messages |
4264782, | Jun 29 1979 | International Business Machines Corporation | Method and apparatus for transaction and identity verification |
4575621, | Mar 07 1984 | CORPRA, A CORP OF PA | Portable electronic transaction device and system therefor |
4706189, | Jun 27 1985 | Special purpose peripheral circuit and method of connecting the same to a computer | |
5005200, | Feb 12 1988 | Public key/signature cryptosystem with enhanced digital signature certification | |
5018196, | Aug 19 1986 | Hitachi, Ltd. | Method for electronic transaction with digital signature |
5022080, | Apr 16 1990 | PITNEY BOWES INC , A CORP OF DELAWARE | Electronic notary |
5023908, | Nov 30 1984 | EMC Corporation | Method and apparatus for personal identification |
5027297, | Sep 29 1989 | ABB POWER T&D COMPANY, INC , A DE CORP | System for time stamping events using a remote master clock |
5031214, | Jan 29 1990 | Document authentication apparatus | |
5050212, | Jun 20 1990 | Apple Inc | Method and apparatus for verifying the integrity of a file stored separately from a computer |
5077666, | Nov 07 1988 | Emtek Health Care Systems, Inc. | Medical information system with automatic updating of task list in response to charting interventions on task list window into an associated form |
5136646, | Mar 08 1991 | Telcordia Technologies, Inc | Digital document time-stamping with catenate certificate |
5150407, | Dec 16 1991 | Secured data storage devices | |
5157726, | Dec 19 1991 | Xerox Corporation | Document copy authentication |
5186498, | Jan 30 1990 | Francotyp-Postalia AG & Co | Method for identifying postage meter and monetary value stamping machines |
5214702, | Feb 08 1988 | Public key/signature cryptosystem with enhanced digital signature certification | |
5216724, | Feb 10 1989 | Canon Kabushiki Kaisha | Apparatus for image reading or processing |
5243652, | Sep 30 1992 | GTE Laboratories Incorporated | Location-sensitive remote database access control |
5299026, | Nov 12 1991 | Xerox Corporation | Tracking the reproduction of documents on a reprographic device |
5315504, | Mar 14 1989 | International Business Machines Corporation | Electronic document approval system |
5319562, | Aug 22 1991 | PSI SYSTEMS, INC | System and method for purchase and application of postage using personal computer |
5339361, | Dec 04 1992 | Texas Instruments Incorporated | System and method for authenticating transmission and receipt of electronic information |
5347579, | Jul 05 1989 | E-CONTACT TECHNOLOGIES LLC | Personal computer diary |
5347580, | Apr 23 1992 | International Business Machines Corporation | Authentication method and system with a smartcard |
5351302, | May 26 1993 | Method for authenticating objects identified by images or other identifying information | |
5367573, | Jul 02 1993 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Signature data object |
5371796, | Jun 02 1992 | ZAXUS LIMITED | Data communication system |
5373561, | Dec 21 1992 | Surety, LLC | Method of extending the validity of a cryptographic certificate |
5422953, | May 05 1993 | Personal date/time notary device | |
5444780, | Jul 22 1993 | International Business Machines Corporation | Client/server based secure timekeeping system |
5467342, | Jan 12 1994 | Cisco Technology, Inc | Methods and apparatus for time stamp correction in an asynchronous transfer mode network |
5471631, | Oct 19 1992 | International Business Machines Corporation | Using time stamps to correlate data processing event times in connected data processing units |
5530851, | Apr 28 1994 | The United States of America as represented by the Secretary of the Navy; UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF THE NAVY, THE | Early commit timestamp computer database protocol |
5544322, | May 09 1994 | CISCO TECHNOLOGY, INC , A CORPORATION OF CALIFORNIA | System and method for policy-based inter-realm authentication within a distributed processing system |
5555307, | Jan 28 1993 | France Telecom Establissement Autonome De Droit Public | Device and process for rendering secure the transmission of faxes, as well as fax unit which has been made secure and incorporating such a device |
5579393, | Jun 21 1994 | YOUNG AMERICA HOMES, INC | System and method for secure medical and dental record interchange |
5602933, | Mar 15 1995 | Cisco Technology, Inc | Method and apparatus for verification of remotely accessed data |
5613012, | Nov 28 1994 | Open Invention Network, LLC | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
5619571, | Jun 01 1995 | Method for securely storing electronic records | |
5629980, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works |
5638446, | Aug 28 1995 | NYTELL SOFTWARE LLC | Method for the secure distribution of electronic files in a distributed environment |
5646997, | Dec 14 1994 | Sony Corporation | Method and apparatus for embedding authentication information within digital data |
5659616, | Jul 19 1994 | Certco, LLC | Method for securely using digital signatures in a commercial cryptographic system |
5673316, | Mar 29 1996 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
5687236, | Jun 07 1995 | Wistaria Trading Ltd | Steganographic method and device |
5721724, | Apr 14 1994 | Kabushiki Kaisha Toshiba | Optical disc containing data stored and linked together in a hierarchical file structure |
5739864, | Aug 24 1994 | Rovi Solutions Corporation | Apparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal |
5742685, | Oct 11 1995 | Pitney Bowes Inc. | Method for verifying an identification card and recording verification of same |
5748740, | Jan 31 1996 | Maxim Integrated Products, Inc | Method, apparatus, system and firmware for secure transactions |
5751809, | Sep 29 1995 | Intel Corporation | Apparatus and method for securing captured data transmitted between two sources |
5765152, | Oct 13 1995 | DIGIMARC CORPORATION AN OREGON CORPORATION | System and method for managing copyrighted electronic media |
5765176, | Sep 06 1996 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
5781629, | Oct 28 1994 | WORLDGATE MANAGEMENT, LLC; Surety, LLC | Digital document authentication system |
5787175, | Oct 23 1995 | JPMORGAN CHASE BANK, N A , AS SUCCESSOR AGENT | Method and apparatus for collaborative document control |
5787178, | Apr 12 1995 | Deutsche Telekom AG | Computerized method for signing a message |
5790790, | Oct 24 1996 | AXWAY INC | Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof |
5828751, | Apr 08 1996 | CERTIFIED MEASUREMENTS, LLC; CERTIFIED MEASUREMENT, LLC | Method and apparatus for secure measurement certification |
5835896, | Mar 29 1996 | eBay Inc | Method and system for processing and transmitting electronic auction information |
5844555, | Jun 20 1996 | Parametric Technology Corporation | Locking mechanism for live mathematical documents |
5867821, | May 11 1994 | INTEL AMERICAS, INC ; Intel-GE Care Innovations LLC | Method and apparatus for electronically accessing and distributing personal health care information and services in hospitals and homes |
5875249, | Jan 08 1997 | TREND MICRO INCORPORATED | Invisible image watermark for image verification |
5883956, | Mar 28 1996 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
5884288, | Jul 07 1996 | Oracle America, Inc | Method and system for electronic bill payment |
5892900, | Aug 30 1996 | INTERTRUST TECHNOLOGIES CORP | Systems and methods for secure transaction management and electronic rights protection |
5898830, | Oct 17 1996 | GraphOn Corporation | Firewall providing enhanced network security and user transparency |
5912974, | May 04 1994 | International Business Machines Corporation | Apparatus and method for authentication of printed documents |
5923763, | Mar 21 1996 | Inventor Holdings, LLC | Method and apparatus for secure document timestamping |
5930796, | Jul 21 1997 | Pitney Bowes Inc. | Method for preventing stale addresses in an IBIP open metering system |
5936149, | May 05 1993 | Personal date/time notary device | |
5948103, | Jun 26 1996 | WACOM CO , LTD | Electronic document security system, affixed electronic seal security system and electronic signature security system |
5949879, | Sep 06 1996 | Pitney Bowes Inc.; Pitney Bowes Inc | Auditable security system for the generation of cryptographically protected digital data |
5956404, | Sep 30 1996 | BT AMERICAS INC | Digital signature with auditing bits |
5958051, | Nov 27 1996 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
5963952, | Feb 21 1997 | International Business Machines Corp. | Internet browser based data entry architecture |
5982506, | Sep 10 1996 | STAMPS COM INC | Method and system for electronic document certification |
6005945, | Mar 20 1997 | PSI Systems, Inc.; PSI SYSTEMS, INC | System and method for dispensing postage based on telephonic or web milli-transactions |
6021491, | Nov 27 1996 | Oracle America, Inc | Digital signatures for data streams and data archives |
6058383, | Jun 27 1996 | Kent Ridge Digital Labs | Computationally efficient method for trusted and dynamic digital objects dissemination |
6070177, | Mar 06 1998 | Vita Systems, Inc. | Database forms with attached audit history |
6072870, | Jun 17 1996 | Hewlett Packard Enterprise Development LP | System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture |
6076080, | Nov 04 1997 | TAYLOR COMMUNICATIONS, INC | Forms order entry system |
6085320, | May 15 1996 | EMC Corporation | Client/server protocol for proving authenticity |
6085321, | Aug 14 1998 | Intel Corporation | Unique digital signature |
6091835, | Aug 31 1994 | CIC ACQUISITION CORP | Method and system for transcribing electronic affirmations |
6101602, | Dec 08 1997 | United States Air Force | Digital watermarking by adding random, smooth patterns |
6105012, | Apr 22 1997 | Oracle America, Inc | Security system and method for financial institution server and client web browser |
6105137, | Jul 02 1998 | Intel Corporation | Method and apparatus for integrity verification, authentication, and secure linkage of software modules |
6111953, | May 21 1997 | Inventor Holdings, LLC | Method and apparatus for authenticating a document |
6122372, | Jun 04 1997 | MOORE, NANCY BARCLAY | System and method for encapsulating transaction messages with verifiable data generated identifiers |
6134327, | Oct 24 1997 | Entrust Technologies Ltd. | Method and apparatus for creating communities of trust in a secure communication system |
6134550, | Mar 18 1998 | Entrust Technologies Limited; ENTRUST, INC | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths |
6134597, | May 28 1997 | International Business Machines Corporation | CRC hash compressed server object identifier |
6145079, | Mar 06 1998 | Deloitte & Touche USA LLP | Secure electronic transactions using a trusted intermediary to perform electronic services |
6154753, | Sep 15 1995 | COLORADO WSC, LLC | Document management system and method for business quality modeling |
6157721, | Aug 12 1996 | INTERTRUST TECHNOLOGIES CORP | Systems and methods using cryptography to protect secure computing environments |
6158003, | Sep 10 1996 | STAMPS COM INC | Method and system for electronic document certification |
6158007, | Sep 17 1997 | Proofpoint, Inc | Security system for event based middleware |
6161181, | Mar 06 1998 | Deloitte & Touche USA LLP | Secure electronic transactions using a trusted intermediary |
6163841, | Jun 23 1998 | Microsoft Technology Licensing, LLC | Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures |
6167523, | May 05 1997 | Intel Corporation | Method and apparatus for forms data validation and processing control |
6175921, | Apr 28 1994 | Citibank, N.A. | Tamper-proof devices for unique identification |
6182219, | Aug 28 1995 | RMAIL LIMITED | Apparatus and method for authenticating the dispatch and contents of documents |
6185682, | Jun 03 1997 | NXP B V | Authentication system |
6185683, | Feb 13 1995 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
6188766, | Mar 05 1997 | HANGER SOLUTIONS, LLC | Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions |
6189096, | May 06 1998 | Kyberpass Corporation | User authentification using a virtual private key |
6199052, | Mar 06 1998 | Deloitte & Touche USA LLP | Secure electronic transactions using a trusted intermediary with archive and verification request services |
6199055, | Nov 05 1997 | STAMPS COM INC | System and method for providing fault tolerant transcriptions over an unsecured communication channel |
6219669, | Sep 17 1998 | Intellectual Ventures I LLC | File transfer system using dynamically assigned ports |
6237096, | Jan 17 1995 | EORIGINAL, INC | System and method for electronic transmission storage and retrieval of authenticated documents |
6240414, | Sep 28 1997 | Open Text SA ULC | Method of resolving data conflicts in a shared data environment |
6253322, | May 21 1997 | Hitachi, Ltd. | Electronic certification authentication method and system |
6260021, | Jun 12 1998 | Philips Electronics North America Corporation | Computer-based medical image distribution system and method |
6260024, | Dec 02 1998 | Red Hat, Inc | Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system |
6266683, | Jul 24 1997 | JPMORGAN CHASE BANK, N A | Computerized document management system |
6269399, | Dec 19 1997 | Qwest Communications International Inc | Gateway system and associated method |
6272506, | Sep 12 1997 | FLECTERE LLC | Computerized verification form processing system and method |
6279042, | Jul 28 1997 | Juniper Networks, Inc | Methods of performing an interdependent task on a document |
6327578, | Dec 29 1998 | PayPal, Inc | Four-party credit/debit payment protocol |
6327656, | Jul 02 1997 | TIMESTAMP COM, INC | Apparatus and method for electronic document certification and verification |
6332193, | Jan 18 1999 | Sensar, Inc.; SENSAR, INC | Method and apparatus for securely transmitting and authenticating biometric data over a network |
6343284, | Dec 08 1997 | Nippon Telegraph and Telephone Corporation | Method and system for billing on the internet |
6345360, | Nov 14 1997 | Fujitsu Limited | Apparatus method and computer readable storage medium with recorded program for managing files with alteration preventing/detecting functions |
6367013, | Jan 17 1995 | EORIGINAL, INC | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
6373974, | Mar 16 1998 | RAKUTEN, INC | Method for extracting multiresolution watermark images to determine rightful ownership |
6381695, | Aug 22 1997 | International Business Machines Corporation | Encryption system with time-dependent decryption |
6381696, | Sep 22 1998 | DOYLE, MICHAEL D | Method and system for transient key digital time stamps |
6385596, | Feb 06 1998 | Microsoft Technology Licensing, LLC | Secure online music distribution system |
6393566, | Jul 28 1995 | COMMERCE, UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF; GOVERNMENT OF THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE, THE | Time-stamp service for the national information network |
6418457, | Dec 10 1997 | CHASE MANHATTAN BANK, THE, A CORPORATION OF NEW YORK | Document storage and processing system for inventors that utilize timestamps and digital signatures |
6442571, | Nov 13 1997 | Intellectual Ventures I LLC | Methods and apparatus for secure electronic, certified, restricted delivery mail systems |
6453327, | Jun 10 1996 | Oracle America, Inc | Method and apparatus for identifying and discarding junk electronic mail |
6466671, | Mar 21 1997 | Nagra France SAS | Smartcard for use with a receiver of encrypted broadcast signals, and receiver |
6470449, | Jul 05 1989 | E-CONTACT TECHNOLOGIES LLC | Time-stamped tamper-proof data storage |
6530023, | Sep 04 1995 | CALLAHAN CELLULAR L L C | Method and device that validates time of an internal source using an external source |
6584565, | Jul 15 1997 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for long term verification of digital signatures |
6587945, | Dec 28 1998 | Koninklijke Philips Electronics N V | Transmitting reviews with digital signatures |
6601172, | Dec 31 1997 | Philips Electronics North America Corp | Transmitting revisions with digital signatures |
6640301, | Jul 08 1999 | HANGER SOLUTIONS, LLC | Third-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents |
6655585, | May 11 1998 | CITICORP CREDIT SERVICES, INC USA | System and method of biometric smart card user authentication |
6711679, | Mar 31 1999 | International Business Machines Corporation | Public key infrastructure delegation |
6735694, | Nov 21 1997 | International Business Machines Corporation | Method and system for certifying authenticity of a web page copy |
6745327, | May 20 1998 | RAKUTEN, INC | Electronic certificate signature program |
6804705, | Jan 30 2001 | 92104 LLC | Systems and methods for providing electronic document services |
6813358, | Nov 17 1998 | HANGER SOLUTIONS, LLC | Method and system for timed-release cryptosystems |
6839879, | May 07 1999 | XILINX, Inc.; Xilinx, Inc | Method and system for time-stamping and managing electronic documents |
6898709, | Jul 02 1999 | Time Certain LLC | Personal computer system and methods for proving dates in digital data files |
7007166, | Jul 02 1996 | Wistaria Trading Ltd | Method and system for digital watermarking |
7017046, | Sep 22 1997 | DFS LINKAGES, INC | System and method for graphical indicia for the certification of records |
7039805, | May 20 1998 | RAKUTEN, INC | Electronic signature method |
7047415, | Sep 22 1997 | DFS LINKAGES, INC | System and method for widely witnessed proof of time |
7233948, | Mar 16 1998 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
20010032314, | |||
20010037454, | |||
20020007453, | |||
20020023220, | |||
20020029249, | |||
20020055942, | |||
20020091782, | |||
20020091927, | |||
20020144154, | |||
20030172120, | |||
20030177357, | |||
20040034780, | |||
20040039912, | |||
20040049521, | |||
20040117684, | |||
20040133524, | |||
20040221014, | |||
20040230657, | |||
20040255120, | |||
20050021480, | |||
20050021963, | |||
20050193075, | |||
20050267919, | |||
20050267939, | |||
20060010501, | |||
20060047762, | |||
EP386867, | |||
EP541281, | |||
EP788535, | |||
WO9203000, | |||
WO9624997, | |||
WO9712460, | |||
WO9949613, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 10 2003 | Authentidate Holding Corp. | (assignment on the face of the patent) | / | |||
Mar 09 2012 | AUTHENTIDATE HOLDING CORP | ROBINSON, ADAM | SECURITY AGREEMENT | 028023 | /0757 | |
Sep 24 2012 | AUTHENTIDATE HOLDING CORP | ROBINSON, ADAM | SECURITY AGREEMENT | 029118 | /0590 | |
Oct 31 2013 | ROBINSON, ADAM | AUTHENTIDATE HOLDING CORP | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 031602 | /0176 | |
May 29 2015 | AUTHENTIDATE HOLDING CORP | ATON SELECT FUND LTD | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 036111 | /0771 | |
Aug 07 2015 | AUTHENTIDATE HOLDING CORP | MKA 79, LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 036442 | /0793 |
Date | Maintenance Fee Events |
Apr 02 2012 | REM: Maintenance Fee Reminder Mailed. |
Apr 19 2012 | M2551: Payment of Maintenance Fee, 4th Yr, Small Entity. |
Apr 19 2012 | M2554: Surcharge for late Payment, Small Entity. |
Feb 18 2016 | M2552: Payment of Maintenance Fee, 8th Yr, Small Entity. |
Apr 06 2020 | REM: Maintenance Fee Reminder Mailed. |
Sep 21 2020 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Aug 19 2011 | 4 years fee payment window open |
Feb 19 2012 | 6 months grace period start (w surcharge) |
Aug 19 2012 | patent expiry (for year 4) |
Aug 19 2014 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 19 2015 | 8 years fee payment window open |
Feb 19 2016 | 6 months grace period start (w surcharge) |
Aug 19 2016 | patent expiry (for year 8) |
Aug 19 2018 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 19 2019 | 12 years fee payment window open |
Feb 19 2020 | 6 months grace period start (w surcharge) |
Aug 19 2020 | patent expiry (for year 12) |
Aug 19 2022 | 2 years to revive unintentionally abandoned end. (for year 12) |